Security Experts:

Connect with us

Hi, what are you looking for?


IoT Security

Serious Vulnerabilities Found in Fujifilm X-Ray Devices

Researchers have uncovered serious denial-of-service (DoS) and improper access control vulnerabilities in X-ray devices made by Japanese imaging giant Fujifilm.

Researchers have uncovered serious denial-of-service (DoS) and improper access control vulnerabilities in X-ray devices made by Japanese imaging giant Fujifilm.

The flaws, described in an advisory published this week by ICS-CERT, affect Fuji Computed Radiography (FCR) XC-2 and Capsula X medical imaging products (CR-IR 357) — Capsula products are marketed as Carbon in the United States. The impacted devices are used in the healthcare sector worldwide.

Fujifilm Computed Radiography vulnerabilitiesAccording to ICS-CERT, these systems are impacted by a high-severity vulnerability that allows an attacker to cause a DoS condition that requires a manual reboot of the device (CVE-2019-10948), and a critical flaw related to the lack of authentication mechanisms for Telnet services (CVE-2019-10950). The second bug can be exploited to access the underlying operating system and possibly gain complete control of a vulnerable device.

Marc Ruef and Rocco Gagliardi, researchers at Swiss-based cybersecurity firm Scip AG, have been credited for finding these flaws.

Ruef told SecurityWeek that the vulnerable devices are typically not connected to the internet and exploitation requires access to the local network. Attacks can be launched by hospital employees, patients or visitors, but attacks over the internet may also be possible by compromising another device on the network and through social engineering (i.e., user interaction is required).

The vulnerabilities were discovered during a penetration testing project conducted by Scip for a hospital. Vulnerabilities in other medical products were discovered as part of the same project, including ultrasound devices and DICOM (Digital Imaging and Communications in Medicine) servers, but no details have been made public due to the fact that the impacted vendors are still investigating the findings.

“The [publicly disclosed] details are very limited because addressing issues in medical devices at customer sites usually takes a very long time. We do not want to give attackers too much details to prevent them from exploiting the issues as long as most customers are exposed,” Ruef explained.

It appears that Fujifilm has not released firmware updates to patch these vulnerabilities and instead has advised users to enable Secure Host functionality on the devices. This feature blocks out all network traffic, except for traffic coming from the IP address associated with the Fujifilm image acquisition console. Customers have also been advised to secure their networks, including through segmentation and by ensuring that only authorized devices and users are granted access.

Ruef said that while the use of the Secure Host functionality can mitigate the risk, attacks may still be possible if the attacker can spoof or compromise the image acquisition console.

The researcher noted that Fujifilm was informed of the vulnerabilities on February 8, but the vendor only started addressing the issues after ICS-CERT was notified by Scip.

Related: Flaws in Roche Medical Devices Can Put Patients at Risk

Related: Critical Flaws Expose Natus Medical Devices to Remote Attacks

Related: Philips Working on Patches for 35 Flaws in Healthcare Product

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.


GoAnywhere MFT users warned about a zero-day remote code injection exploit that can be targeted directly from the internet